ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Handling of Man-In-The-Middle Attack in WSN Through Intrusion Detection System

Journal: International Journal of Emerging Trends in Engineering Research (IJETER) (Vol.8, No. 5)

Publication Date:

Authors : ; ;

Page : 1503-1510

Keywords : MITM; Wireless Sensor Network; Fault Tolerance; Cyber attack;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The wireless sensor network (WSN) is one the most convenient and easily adoptable ad-hoc technique for data transmission. With many flexibilities of WSN there are many loop holes. The decentralized architecture of WSN invites many types of attacks like man-in-the-middle (MITM) and black holes etc. In this paper, we propose a MITM-Intrusion Detection System (MITM-IDS) model for detection, isolation of attack and reconfiguration for attacked nodes. The IDS technique helps to train the nodes with the possible attacks. The simulation shows the rate of 89.147%, of productivity in way to perform MITM attacks. This work aims to develop an attack tolerant IDS.

Last modified: 2020-06-15 14:41:03